CVE-2024-55879

9.1 CRITICAL

📋 TL;DR

This vulnerability allows any XWiki user with script rights to execute arbitrary remote code by adding XWiki.ConfigurableClass instances to pages. This compromises the entire XWiki installation's confidentiality, integrity, and availability. All XWiki installations from version 2.3 up to (but not including) 15.10.9 and 16.3.0 are affected.

💻 Affected Systems

Products:
  • XWiki Platform
Versions: 2.3 up to but not including 15.10.9 and 16.3.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires users with script rights, which may not be default but is common in many configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control over the XWiki server, potentially leading to data theft, destruction, or lateral movement to other systems.

🟠

Likely Case

Attackers with script rights exploit this to execute arbitrary code, compromising the XWiki instance and potentially the underlying server.

🟢

If Mitigated

If script rights are strictly controlled and only granted to trusted administrators, risk is significantly reduced but not eliminated.

🌐 Internet-Facing: HIGH - Internet-facing XWiki instances are directly accessible to attackers who can target users with script rights.
🏢 Internal Only: HIGH - Internal attackers or compromised accounts with script rights can still exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires script rights but is straightforward once those rights are obtained. The advisory provides technical details that could facilitate exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 15.10.9 or 16.3.0

Vendor Advisory: https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-r279-47wg-chpr

Restart Required: Yes

Instructions:

1. Backup your XWiki installation and database. 2. Download XWiki 15.10.9 or 16.3.0 from the official website. 3. Replace the existing installation with the patched version. 4. Restart the XWiki service or application server.

🔧 Temporary Workarounds

No workarounds available

all

The vendor advisory states no known workarounds exist except upgrading.

🧯 If You Can't Patch

  • Immediately revoke script rights from all non-essential users and audit user permissions.
  • Implement network segmentation to isolate the XWiki server and monitor for suspicious activity.

🔍 How to Verify

Check if Vulnerable:

Check your XWiki version. If it's between 2.3 and 15.10.9 (excluding 15.10.9) or between 15.10.9 and 16.3.0 (excluding 16.3.0), you are vulnerable.

Check Version:

Check the XWiki administration panel or view the xwiki.properties file for version information.

Verify Fix Applied:

After upgrading, verify the version is exactly 15.10.9 or 16.3.0 or higher.

📡 Detection & Monitoring

Log Indicators:

  • Unusual page modifications involving XWiki.ConfigurableClass
  • Unexpected script execution events
  • Suspicious user activity from accounts with script rights

Network Indicators:

  • Unusual outbound connections from the XWiki server
  • Unexpected network traffic patterns

SIEM Query:

Search for events where user with script rights modifies pages containing 'XWiki.ConfigurableClass' or similar suspicious patterns.

🔗 References

📤 Share & Export